Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • Arcus Trading Standards

    ARCUS GLOBAL LIMITED

    Arcus Trading Standards is a flexible and intuitive cloud-based solution helping Trading Standard's practitioners manage all aspects of their work including inspections, investigations, monitoring, enforcement, providing advice, and managing evidence. The included mobile app supports full access and offline remote working. Enabling officers and teams to work efficiently and effectively.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    Network 2 Supplies Ltd

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • CDW Check Point Harmony SASE

    CDW LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Managed Azure Virtual Desktop

    Intercity Technology Limited

    Intercity’s Managed Azure Virtual Desktop is a secure, scalable virtual desktop solution. It enables access to Windows desktops and applications from anywhere, on any device with centralised management and automated updates. Improving productivity and flexibility while reducing IT overhead. Ideal for organisations embracing remote work and cloud-based desktop solutions.

  • Machine to Machine alerting

    Boomalert Ltd

    BoomAlert automates incident communication. Build bespoke communication workflows, meet requirements for critical events. Alerting workflows automate coordinated processes based on responses, time triggers, count triggers and escalation paths. Critical Alerting, Incident Management, Business Continuity, IT Monitoring, Machine-2-Machine Alerting, Event Management. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited.

  • Crisis Simulation Service

    Core to Cloud Ltd

    Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.

  • End to End Software Development, Resource Optimization with AI

    ADAPPT LIMITED

    Progressive software development services at Adappt. We develop robust, scalable and secured web/mobile applications. Share your ideas, taking your business on a success flight! Offload manual data input and repetitive tasks to AI for accurate/speedy results. Enables employees to concentrate on value-driven work, enhancing throughput and minimizing human errors.

  • Forcepoint Data Guard

    Cyberlab

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Wonde EduSync

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    Wonde’s innovative School Edusync is a Electronic document and records management (EDRM) tool that provides a secure and automated way to provision school Learning Management Systems (LMSs) such as Google-Workspace, Microsoft-SDS, and Apple School Manager with data from a schools MIS, automatically creating, updating and deleting users, groups and classrooms.

  • Identity Threat Defense & Response (ITDR) - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Varonis SaaS Data Security Platform

    SOFTCAT PLC

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Powered by Neo: Vehicle Abandonment Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's Vehicle Abandonment Management solution efficiently addresses the challenges of managing abandoned vehicles in the housing sector. Our robust case management and task management capabilities streamline identification, monitoring, and resolution processes.

  • Geopolitical Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you. Accelerate your decision-making with contextualized OSINT data about geopolitical threats and trends. We fuse open source, dark web, technical sources, and original research. By dynamically linking, categorising, and updating intelligence in real time,

  • Scrap Metal Dealer's Registration Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ scrap metal dealer licensing software provides data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power you mandatory, selective and additional schemes.

  • Netwrix Endpoint Protector

    SOFTCAT PLC

    oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.

  • Sentinel Hotline

    YUDU Sentinel

    Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.

  • GBG IDscan Enterprise

    GB Group plc

    GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.

  • Computacenter - Proofpoint Complete Package

    COMPUTACENTER (UK) LIMITED

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Panacea Sourcing Software

    Panacea Applications Limited

    End-to-end source-to-pay (S2P). Order to delivery, goods receipt and supplier invoicing. Audit trail, reports. GDPR and PCR Compliant. Accounts payable, finance system. Supplier portals. Configurable e-Catalogue, instant pricing options. Procurement, tendering, contract lifecycle management, due diligence. DPS, Dynamic Markets, frameworks. RFQ, further-competition. Evaluation, moderation, award. Category Management. Find-a-Tender, Contracts Finder.

  • Palo Alto Prisma Services

    CYBIT LIMITED

    Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include: Prisma Cloud for cloud application security Prisma Access (SASE) Cloud access security Prisma SaaS for visibility and control

  • Flowmon by Progress

    SOFTCAT PLC

    Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.

  • Digital twin management platform (Hybrid)

    CYBEXER (UK) LTD

    The Digital Twin Management Platform (Hybrid) provides a public/private/hybrid cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.

  • Decommissioning as a service CESG CAS-S Compliant (DaaS) (Hardware and Media destruction) copy

    Network 2 Supplies Ltd

    Decommissioning, data destruction and disposal of legacy equipment is central to managing a system migration to Cloud. N2S ensure any equipment or media that has previously been classified up to, and including, Official Sensitive, is destroyed and disposed of in line with CESG and WEEE regulations.

  • ProofPoint Secure Email Relay

    SOFTCAT PLC

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • CDW Microsoft Entra ID P2

    CDW LIMITED

    In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance

  • Digital Temporary Identification Documents

    EQUINE REGISTER LIMITED

    Enables the creation of a digital version of Defra's equine identity temporary documents also supports semi-wild/semi-feral populations. The Temporary Identification Documents integrate directly to the Central Equine Database and Digital Stable, can be updated in real-time and integrated with welfare and enforcement agency systems. Can be adapted for other animals.

  • Secure ServiceNow UK hosting

    Viewdeck Consulting Limited

    Service provides secure, UK hosted ServiceNow environments tailored for the UK public sector, ensuring data sovereignty and compliance.

  • Pathpoint® ePICUPS

    OPEN MEDICAL LTD

    A HSCN cloud-based platform that digitises and streamlines the PICUPS and PICUPS plus tools. Facilitates efficient production of the rehabilitation prescription augmenting the continuation of the patients rehab journey. Extraction tools allow relevant data available for export to UKROC in line with best practice guidelines, creating significant efficiencies for clinicians.

  • Data Science & Data Engineering As A Service

    NAIMURI LIMITED

    Providing Data Science capability enabling organisations to maximise value & intelligence from data. We have expertise in Natural language processing (NLP), Computer Vision, Data Synthesis, Data Analytics, Large Language Models (LLMs), Knowledge Graphs, and Data Governance. We employ best practices in Data Engineering, ML Engineering, MLOps and ML Assurance.

  • Silverfort Unified Identity Protection Platform powered by BlueFort Evolve

    BLUEFORT SECURITY LIMITED

    Allows organisations to protect their Active Directory Environment and Users, by the use of user behaviour analysis, MFA, Service Account Protection and ITDR